Debian 10218 Published by

The following security updates has been released for Debian: [SECURITY] [DSA 2568-1] rtfm security update, [SECURITY] [DSA 2567-1] request-tracker3.8 security update, and [SECURITY] [DSA 2569-1] icedove security update



[SECURITY] [DSA 2568-1] rtfm security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-2568-1 security@debian.org
http://www.debian.org/security/ Florian Weimer
October 26, 2012 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : rtfm
Vulnerability : privilege escalation
Problem type : remote
Debian-specific: no
CVE ID : CVE-2012-4731

IT was discovered that RTFM, the FAQ manager for Request Tracker,
allows authenticated users to create articles in any class.

For the stable distribution (squeeze), this problem has been fixed in
version 2.4.2-4+squeeze2.

We recommend that you upgrade your rtfm packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/
[SECURITY] [DSA 2567-1] request-tracker3.8 security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-2567-1 security@debian.org
http://www.debian.org/security/ Florian Weimer
October 26, 2012 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : request-tracker3.8
Vulnerability : several
Problem type : remote
Debian-specific: no
CVE ID : CVE-2012-4730 CVE-2012-4732 CVE-2012-4734 CVE-2012-4735
CVE-2012-4884

Several vulnerabilities were discovered in Request Tracker, an issue
tracking system.

CVE-2012-4730
Authenticated users can add arbitrary headers or content to
mail generated by RT.

CVE-2012-4732
A CSRF vulnerability may allow attackers to toggle ticket
bookmarks.

CVE-2012-4734
If users follow a crafted URI and log in to RT, they may
trigger actions which would ordinarily blocked by the CSRF
prevention logic.

CVE-2012-4735
Several different vulnerabilities in GnuPG processing allow
attackers to cause RT to improperly sign outgoing email.

CVE-2012-4884
If GnuPG support is enabled, authenticated users attackers can
create arbitrary files as the web server user, which may
enable arbitrary code execution.

Please note that if you run request-tracker3.8 under the Apache web
server, you must stop and start Apache manually. The "restart"
mechanism is not recommended, especially when using mod_perl.

For the stable distribution (squeeze), these problems have been fixed
in version 3.8.8-7+squeeze6.

For the unstable distribution (sid), these problems have been fixed in
version 4.0.7-2 of the request-tracker4 package.

We recommend that you upgrade your request-tracker3.8 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/
[SECURITY] [DSA 2569-1] icedove security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-2569-1 security@debian.org
http://www.debian.org/security/ Florian Weimer
October 29, 2012 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : icedove
Vulnerability : several
Problem type : remote
Debian-specific: no
CVE ID : CVE-2012-3982 CVE-2012-3986 CVE-2012-3990 CVE-2012-3991
CVE-2012-4179 CVE-2012-4180 CVE-2012-4182 CVE-2012-4186
CVE-2012-4188

Multiple vulnerabilities have been discovered in Icedove, Debian's
version of the Mozilla Thunderbird mail client. The Common
Vulnerabilities and Exposures project identifies the following
problems:

CVE-2012-3982
Multiple unspecified vulnerabilities in the browser engine
allow remote attackers to cause a denial of service (memory
corruption and application crash) or possibly execute
arbitrary code via unknown vectors.

CVE-2012-3986
Icedove does not properly restrict calls to DOMWindowUtils
methods, which allows remote attackers to bypass intended
access restrictions via crafted JavaScript code.

CVE-2012-3990
A Use-after-free vulnerability in the IME State Manager
implementation allows remote attackers to execute arbitrary
code via unspecified vectors, related to the
nsIContent::GetNameSpaceID function.

CVE-2012-3991
Icedove does not properly restrict JSAPI access to the
GetProperty function, which allows remote attackers to bypass
the Same Origin Policy and possibly have unspecified other
impact via a crafted web site.

CVE-2012-4179
A use-after-free vulnerability in the
nsHTMLCSSUtils::CreateCSSPropertyTxn function allows remote
attackers to execute arbitrary code or cause a denial of
service (heap memory corruption) via unspecified vectors.

CVE-2012-4180
A heap-based buffer overflow in the
nsHTMLEditor::IsPrevCharInNodeWhitespace function allows
remote attackers to execute arbitrary code via unspecified
vectors.

CVE-2012-4182
A use-after-free vulnerability in the
nsTextEditRules::WillInsert function allows remote attackers
to execute arbitrary code or cause a denial of service (heap
memory corruption) via unspecified vectors.

CVE-2012-4186
A heap-based buffer overflow in the
nsWav-eReader::DecodeAudioData function allows remote attackers
to execute arbitrary code via unspecified vectors.

CVE-2012-4188
A heap-based buffer overflow in the Convolve3x3 function
allows remote attackers to execute arbitrary code via
unspecified vectors.

For the stable distribution (squeeze), these problems have been fixed
in version 3.0.11-1+squeeze14.

For the testing distribution (wheezy) and the unstable distribution
(sid), these problems have been fixed in version 10.0.9-1.

We recommend that you upgrade your icedove packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/